Skip to main content

Showing 1–10 of 10 results for author: Lazzeretti, R

.
  1. arXiv:2403.03858  [pdf, other

    cs.CR

    Exploring Jamming and Hijacking Attacks for Micro Aerial Drones

    Authors: Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, Selcuk Uluagac

    Abstract: Recent advancements in drone technology have shown that commercial off-the-shelf Micro Aerial Drones are more effective than large-sized drones for performing flight missions in narrow environments, such as swarming, indoor navigation, and inspection of hazardous locations. Due to their deployments in many civilian and military applications, safe and reliable communication of these drones througho… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: Accepted at IEEE International Conference on Communications (ICC) 2024

  2. Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices

    Authors: Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, Selcuk Uluagac

    Abstract: In this work, we present a device-centric analysis of security and privacy attacks and defenses on Extended Reality (XR) devices, highlighting the need for robust and privacy-aware security mechanisms. Based on our analysis, we present future research directions and propose design considerations to help ensure the security and privacy of XR devices.

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: This is the author's version of the work. It is posted here for personal/educational use only. The definitive version was published in IEEE Security & Privacy Magazine Jan/Feb 2024

    Journal ref: in IEEE Security & Privacy, vol. 22, no. 01, pp. 10-23, 2024

  3. arXiv:2209.02835  [pdf, other

    cs.CR cs.CY cs.NI

    Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey

    Authors: Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk

    Abstract: Today Internet is experiencing a massive number of users with a continuously increasing need for data, which is the leading cause of introduced limitations among security and privacy issues. To overcome these limitations, a shift from host-centric to data-centric is proposed, and in this context, Information-Centric Networking (ICN) represents a promising solution. Nevertheless, unsettling the cur… ▽ More

    Submitted 11 July, 2023; v1 submitted 6 September, 2022; originally announced September 2022.

  4. arXiv:2109.14442  [pdf, other

    cs.CR

    A Survey on Security and Privacy Issues of UAVs

    Authors: Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam EL Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac

    Abstract: In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace users. The tremendous benefits of this technology in civilian applications such as hostage rescue and parcel delivery will integrate smart cities in the future. Nowadays, the affordability of commercial drones expands its usage at a large scal… ▽ More

    Submitted 5 October, 2021; v1 submitted 29 September, 2021; originally announced September 2021.

  5. arXiv:1810.07321  [pdf, ps, other

    cs.CR cs.LG

    Malware triage for early identification of Advanced Persistent Threat activities

    Authors: Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti

    Abstract: In the last decade, a new class of cyber-threats has emerged. This new cybersecurity adversary is known with the name of "Advanced Persistent Threat" (APT) and is referred to different organizations that in the last years have been "in the center of the eye" due to multiple dangerous and effective attacks targeting financial and politic, news headlines, embassies, critical infrastructures, TV prog… ▽ More

    Submitted 16 October, 2018; originally announced October 2018.

  6. arXiv:1806.05766  [pdf, other

    cs.CR

    PADS: Practical Attestation for Highly Dynamic Swarm Topologies

    Authors: Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise

    Abstract: Remote attestation protocols are widely used to detect device configuration (e.g., software and/or data) compromise in Internet of Things (IoT) scenarios. Unfortunately, the performances of such protocols are unsatisfactory when dealing with thousands of smart devices. Recently, researchers are focusing on addressing this limitation. The approach is to run attestation in a collective way, with the… ▽ More

    Submitted 14 June, 2018; originally announced June 2018.

    Comments: Submitted to ESORICS 2018

  7. arXiv:1803.10758  [pdf, other

    cs.CR

    SEMBA:SEcure multi-biometric authentication

    Authors: Giulia Droandi, Mauro Barni, Riccardo Lazzeretti, Tommaso Pignata

    Abstract: Biometrics security is a dynamic research area spurred by the need to protect personal traits from threats like theft, non-authorised distribution, reuse and so on. A widely investigated solution to such threats consists in processing the biometric signals under encryption, to avoid any leakage of information towards non-authorised parties. In this paper, we propose to leverage on the superior per… ▽ More

    Submitted 28 March, 2018; originally announced March 2018.

  8. arXiv:1704.05521  [pdf, ps, other

    cs.DC cs.CR

    Building Regular Registers with Rational Malicious Servers and Anonymous Clients -- Extended Version

    Authors: Antonella Del Pozzo, Silvia Bonomi, Riccardo Lazzeretti, Roberto Baldoni

    Abstract: The paper addresses the problem of emulating a regular register in a synchronous distributed system where clients invoking ${\sf read}()$ and ${\sf write}()$ operations are anonymous while server processes maintaining the state of the register may be compromised by rational adversaries (i.e., a server might behave as \emph{rational malicious Byzantine} process). We first model our problem as a Bay… ▽ More

    Submitted 18 April, 2017; originally announced April 2017.

    Comments: Extended version of paper accepted at 2017 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML 2017)

    MSC Class: 68

  9. arXiv:1701.04221  [pdf, other

    cs.SI physics.soc-ph

    It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features

    Authors: Mauro Conti, Daniele Lain, Riccardo Lazzeretti, Giulio Lovisotto, Walter Quattrociocchi

    Abstract: Given the huge impact that Online Social Networks (OSN) had in the way people get informed and form their opinion, they became an attractive playground for malicious entities that want to spread misinformation, and leverage their effect. In fact, misinformation easily spreads on OSN and is a huge threat for modern society, possibly influencing also the outcome of elections, or even putting people'… ▽ More

    Submitted 16 January, 2017; originally announced January 2017.

    Comments: 10 pages, 5 figures

  10. Piecewise Function Approximation with Private Data

    Authors: Riccardo Lazzeretti, Tommaso Pignata, Mauro Barni

    Abstract: We present two Secure Two Party Computation (STPC) protocols for piecewise function approximation on private data. The protocols rely on a piecewise approximation of the to-be-computed function easing the implementation in a STPC setting. The first protocol relies entirely on Garbled Circuit (GC) theory, while the second one exploits a hybrid construction where GC and Homomorphic Encryption (HE) a… ▽ More

    Submitted 17 March, 2015; originally announced March 2015.

    Comments: Draft of paper that will be soon submitted to IEEE Transaction on Information Forensic and Security